ChameleonSoft: Software Behavior Encryption for Moving Target Defense

被引:0
作者
Mohamed Azab
Mohamed Eltoweissy
机构
[1] Virginia Tech,The Bradley Department of Electrical and Computer Engineering
[2] Egypt-Japan University of Science and Technology,undefined
来源
Mobile Networks and Applications | 2013年 / 18卷
关键词
cyber security; ubiquitous computing; software diversity; moving target defense; biologically-inspired security;
D O I
暂无
中图分类号
学科分类号
摘要
Ubiquitous cyber systems and their supporting infrastructure impact productivity and quality of life immensely. Their penetration in our daily life increases the need for their enhanced resilience and for means to secure and protect them. One major threat is the contemporary software monoculture. Recent research illustrated the vulnerability of the software monoculture and proposed diversity to reduce the attack surface. In this paper, we propose a biologically-inspired defense system, ChameleonSoft, that employs multidimensional software diversity to, in effect, induce spatiotemporal “software behavior encryption” for moving target defense. The key principles of ChameleonSoft are decoupling functional roles from runtime role players; devising intrinsically-resilient composable online-programmable building blocks; separating logic, state and physical resources; and employing functionally-equivalent, behaviorally-different code variants. ChameleonSoft is also equipped with an autonomic failure recovery mechanism for enhanced resilience. Nodes employing ChameleonSoft autonomously and cooperatively change their recovery and encryption policies both proactively and reactively according to the continual changes in context and environment. Using analysis and simulation, our results show that chameleonsoft can encrypt the execution behavior by confusion and diffusion induction at a reasonable overhead.
引用
收藏
页码:271 / 292
页数:21
相关论文
共 18 条
[1]  
Spafford EH(1994)Computer viruses as artificial life J Artif Life 1 249-265
[2]  
Avizienis A(1977)On the implementation of n-version programming for software fault tolerance during execution IEEE COMPSAC. 77 149-155
[3]  
Chen L(1991)An experimental evaluation of software redundancy as a strategy for improving reliability IEEE Trans Software Eng 17 692-702
[4]  
Eckhardt DE(1975)System structure for software fault tolerance IEEE Trans Software Eng 1 220-232
[5]  
Caglayan AK(1986)An experimental evaluation of the assumption of independence in multiversion programming IEEE Trans Software Eng 12 96-109
[6]  
Knight JC(1997)N-version design versus one good version IEEE Software 14 71-76
[7]  
Lee LD(1993)Operating system protection through program evolution Comput Secur 12 565-584
[8]  
McAllister DF(2005)An architecture a day keeps the hacker away SIGARCH Comput Architect News 33 34-41
[9]  
Vouk MA(undefined)undefined undefined undefined undefined-undefined
[10]  
Kelly JJP(undefined)undefined undefined undefined undefined-undefined